|
Books > Computing & IT > General
Fully updated to ASP.NET 5.0, ASP.NET Core in Action, Second
Edition is a hands-on primer to building cross-platform web
applications with your C# and .NET skills. Even if you've never
worked with ASP.NET you'll start creating productive cross-platform
web apps fast. And don't worry about late-breaking changes to
ASP.NET Core. With this Manning Early Access Program edition you'll
get updates right up until it ships to the printer, so you're
always working with the latest version of the technology. about the
technologyASP.NET Core is a highly flexible, high performance cross
platform web framework that's entirely free and open source.
ASP.NET Core developers enjoy choice without compromise, benefiting
from both a mature, well-supported stack and the freedom to develop
and deploy from and onto any cloud or on-prem platform. Now in
version 5.0, the latest version of ASP.NET Core includes powerful
new additions for building server-side apps and background
services. about the book ASP.NET Core in Action, Second Edition
opens up the world of cross-platform web development with ASP.NET
Core. You'll start with a crash course in .NET Core, immediately
cutting the cord between ASP.NET and Windows. Then, you'll begin to
build amazing web applications step by step, systematically adding
essential features like logins, configuration, dependency
injection, and custom components. Along the way, you'll mix in
important process steps like testing, multiplatform deployment, and
security. Fully updated to version 5.0, this new edition fully
covers new features such as server-side apps with Razor Pages, and
the new ASP.NET Core hosting paradigm. what's inside Covers ASP.NET
Core 5.0 Dynamic page generation with the Razor templating engine
Server-side apps with Razor Pages Authentication and authorization
Unit tests and integration tests for ASP.NET Core apps Create a Web
API for serving JSON to client-side applications Developing ASP.NET
Core apps for non-Windows servers about the readerReaders need
intermediate experience with C# or a similar language. about the
author Andrew Lock is a Microsoft MVP who has been working with
ASP.NET Core since before the first release. He has a PhD in
digital image processing, and has been developing professionally
using .NET for the last 10 years.
This new self-study system delivers complete coverage of every
topic on the Certified in Cybersecurity exam Take the Certified in
Cybersecurity exam from (ISC)2 with confidence using the
information contained in this comprehensive study guide. Written by
two cybersecurity experts and successful authors, CC Certified in
Cybersecurity All-in-One Exam Guide offers background material,
detailed examples, and accurate practice questions—all in a
single volume. Each exam domain is presented with information
mapped directly to the body of knowledge. Using the trusted
“All-in-One†format, the book reviews every topic on the test
and lays out the foundational knowledge, skills, and abilities
necessary to be successful in an entry-level cybersecurity role.
You will get historical and background information and technical
details on core concepts as well as stories, discussions, and
anecdotes from real-world cybersecurity experts.
•  Covers all exam domains established by the
governing body, (ISC)2 • Online content includes 200+
practice questions in the customizable Total Tester exam engine
•  Written by a pair of cybersecurity experts and
well-known authors
With over 90 million monthly users and counting, Roblox is one of
the most popular games on the planet! The Big Book of Roblox helps
players get the most out of this dynamic sandbox game. Packed with
tips, hints, and hacks, this complete, up-to-date guide covers
basic strategy as well as advanced tricks and is essential reading
for anyone who wants to play like a pro. Topics covered include
navigation, combat, trading, and mini games—accompanied by over
100 full-color gameplay photos. Additional chapters focus on
building mode, popular in-game experiences, and even a look behind
the scenes. Take your creations to new levels and maximize the
value of your playing time with The Big Book of Roblox!
An up-close account from the world’s first metaverse-embedded
reporter In Making a Metaverse That Matters: From Snow Crash &
Second Life to A Virtual World Worth Fighting For, the celebrated
author of The Making of Second Life and Game Design Secrets, Wagner
James Au, delivers an engrossing exploration of how nascent
metaverse platforms have already captured the imagination of
millions. Featuring powerful stories and dozens of incisive
interviews with insiders including Metaverse creator Neal
Stephenson himself, the author uses his unique, grassroots-level
perspective as the first reporter embedded in a metaverse platform.
Readers will learn about: How to understand and define the
Metaverse and cut through the many myths and misconceptions around
it. A behind-the-scenes account of launching Second Life, the first
metaverse platform to achieve mainstream awareness, and what its
many controversies teach us. Where current platforms Meta, Roblox,
Fortnite, VRChat, and Lamina1, Neal Stephenson’s own metaverse
startup, fit in the ecosystem. How to address the many dangers
inherent in the Metaverse before it becomes central to the
Internet. Perfect for XR industry members and indie creatives,
Making a Metaverse That Matters is also for tech
professionals, virtual world communities, and anyone interested in
the future of culture and commerce.
This is the 3rd volume of Advances in Telecommunication Management,
focusing on Information Technology and Crisis Management.
In a significant contribution to the study of the brain and
behavior, Coward develops a system model for the human brain based
on a new physiologically based theory of learning and memory. The
work is primarily intended for neuropsychologists, but will be of
interest to anyone concerned with understanding the brain as a
functioning system. The author has twenty years' experience in most
of the different aspects of designing complex electronic systems.
Such a system today has up to several billion hardware components
such as individual transistors, and millions of lines of software.
Coward argues that the methodology used to handle the design of
such systems can be modified and adapted to understand the brain.
In the design of electronic systems, the concept instruction makes
it possible to rigorously translate from high level operational
descriptions to detailed descriptions in terms of machine code and
transistor structures. In the brain, the concept pattern can make
it possible to translate between the descriptions of psychology and
physiology and make functional understanding possible. Any change
in the state of a neuron can be interpreted on a system level as
the recognition of a pattern. Pattern is precisely defined and
includes both objects and changes to objects. Based on these
observations, Coward designs a model called the cascaded pattern
extraction hierarchy to explain the functioning of the brain,
showing that the brain can be visualized as a pattern extraction
template, in which successive layers are able to extract
increasingly complex patterns from relatively simple input.
Coward demonstrates that as a pattern extraction template, the
brain forms a hierarchy in connectivity space. Early layers--those
closest to sensory input--can be interpreted as extracting patterns
from simple sensory input. Later layers generate action
recommendations, and later still, they select actions, all within
the same pattern extraction paradigm. According to the model, the
firing of a neuron at these points constitutes both pattern
recognition and action recommendation. Coward's system model not
only provides a framework for understanding and predicting
psychological phenomena, including the functioning of personality,
but also accounts for such apparent anomalies as the difference
between short and long term memory and the fact that localized
brain damage does not remove the memory of individual events.
Widely useful for studies of brain and behavior, Pattern Thinking
also suggests how to identify promising areas to investigate in the
treatment of psychological illnesses.
Multifunctional Nanocomposites for Targeted Drug Delivery in Cancer
Therapy explores the design, synthesis, and application of
different multifunctional nanocomposites drug delivery system for
cancer treatment. It encompasses initial chapters discussing
introductory information about cancer, followed by chapters
focusing on the detailed information about various novel drug
delivery systems for treatment of several organ site cancers such
as prostate, skin, breast, lung, liver, pancreas, stomach, colon,
blood, mouth and throat. It is a valuable resource for cancer
researchers, oncologists, graduate students, and members of
biomedical research who need to understand more about novel
nanotechnologies applied to cancer treatment.
- The book discusses the recent techniques in NGS data analysis
which is the most needed material by biologists (students and
researchers) in the wake of numerous genomic projects and the trend
toward genomic research. - The book includes both theory and
practice for the NGS data analysis. So, readers will understand the
concept and learn how to do the analysis using the most recent
programs. - The steps of application workflows are written in a
manner that can be followed for related projects. - Each chapter
includes worked examples with real data available on the NCBI
databases. Programming codes and outputs are accompanied with
explanation. - The book content is suitable as teaching material
for biology and bioinformatics students. Meets the requirements of
a complete semester course on Sequencing Data Analysis Covers the
latest applications for Next Generation Sequencing Covers data
reprocessing, genome assembly, variant discovery, gene profiling,
epigenetics, and metagenomics
The Middle Ages have provided rich source material for physical and
digital games from Dungeons and Dragons to Assassin’s Creed. This
volume addresses the many ways in which different formats and genre
of games represent the period. It considers the restrictions placed
on these representations by the mechanical and gameplay
requirements of the medium and by audience expectations of these
products and the period., highlighting innovative attempts to
overcome these limitations through game design and play. Playing
the Middle Ages considers a number of important and timely issues
within the field including: one, the connection between medieval
games and political nationalistic rhetoric; two, trends in the
presentation of religion, warfare and other aspects of medieval
society and their connection to modern culture; three, the
problematic representations of race; and four, the place of gender
and sexuality within these games and the broader gaming community.
The book draws on the experience of a wide-ranging and
international group of academics across disciplines and from games
designers. Through this combination of expertise, it provides a
unique perspective on the representation of the Middle Ages in
modern games and drives key discussions in the fields of history
and game design.
Recent advances in science and engineering have led to the
proliferation of cyber-physical systems. Now viewed as a pivotal
area of research, the application of CPS has expanded into several
new and innovative areas. Challenges, Opportunities, and Dimensions
of Cyber-Physical Systems explores current trends and enhancements
of CPS, highlighting the critical need for further research and
advancement in this field. Focusing on architectural fundamentals,
interdisciplinary functions, and futuristic implications, this book
is an imperative reference source for scholars, engineers, and
students in the scientific community interested in the current and
future advances in CPS.
Purchasing and Financial Management of Information Technology aims
to significantly reduce the amount of money wasted on IT by
providing readers with a comprehensive guide to all aspects of
planning, managing and controlling IT purchasing and finance.
Starting from a recognition that IT purchasing and the financial
management often needs to be treated differently from other types
of expenditure, the author draws on over 25 years of experience in
the field to provide readers with useful mixture of good procedures
and common sense rules that have been tried, tested and found to
work. Many of these are illustrated by case histories, each with a
moral or a lesson. Purchasing and Financial Management of
Information Technology provides useful guidelines and advice on
whole range of topics including: * IT acquisitions policy * Dealing
with suppliers * Budgeting and cost control * IT cost and risk
management * Specification, selection and evaluation of systems *
IT value for money
IT Performance Management addresses the way organizations should
balance the demand and the supply of information technology,
optimizing the cost and maximizing the business value of IT.
In this book several aspects of IT performance management are
described. The way this management is executed and the techniques,
which should be used, depend on the maturity of the relationship
between the IT function and the lines of business of an
organization. The foundation of the authors' approach is based on
the flow of money and related management objectives. However,
performance management is primarily based on perceptions.
Therefore, this book introduces the IT value perception model. This
model describes four separate levels of perception for the business
value of IT. If the demand and the supply of IT do not share the
same perception level, the balance is lost, which will lead to
friction and inefficiency within an organization.
This book is not about what is good or what is bad, but rather is
about the 'what', the 'why' and to a limited extent the 'how' of
managing the performance of IT. Therefore, the book finishes with a
'back-to-business' section in which a self-assessment checklist, a
potential growth path and ten next steps are provided. This enables
the reader to start applying this book in his every day working
environment immediately.
IT Performance Management:
* Provides an overview of best practices and available thinking on
the subject of IT cost and value
* Describes the subject of IT cost and value related to management
issues on IT strategy, portfolio management, service management,
architecture and sourcing
* Addresses differing degrees of maturitybetween IT and the
business, illustrated by case studies
Practical and easy to integrate into day to day decision making
immediately
Deals with multiple perceptions on the role of the IT organisation
in the business
Discusses the topics currently on the CIO's agenda
The authors bring a dual perspective--that of a practicing
consultant and that of a professor of economics--to the complex
strategic questions facing managers and corporate leaders who want
their firms to get the most out of their investments in information
technology. The information economy is built upon the myriad and
sometimes unforeseen ways in which information technologies have
become engines of productivity in themselves, rather than just
fancy adjuncts. In explaining the rise of the information economy,
the authors provide not only valuable context often missing from
today's discussions but also a thorough understanding of the
origination, development, and diffusion process of innovations.
They also examine prevailing practices and implications for the
future, including the potential pitfalls common to some information
technology strategies. Relying on an underpinning of economic
theory combined with heavy empirical analysis, Kudyba and Diwan
describe the true nature of the information economy, paying as much
attention to its particularities as to its more profound
implications. How is information technology being implemented
across industry sectors, and how can it be harnessed to improve
overall firm-level productivity? How have innovations in high
technology impacted e-commerce? Which e-commerce strategies
prevail, and what can be expected of them? How can traditional
economic theory help managers evaluate such in-vogue strategies as
customer relationship management, market exchanges, and supply
chain management? The authors answer these questions and more,
including one of the most vexing in the short history of
e-commerce: What led to the demise of so many technology stocksand
dot-coms following the spring 2000 Nasdaq plunge, and what are the
longer-term prospects for e-business?
Cases on ICT Utilization, Practice and Solutions: Tools for
Managing Day-to-Day Issues presents past, present and future
research directions within the field. This book includes cases on
the latest advances in Information Communication Technology. The
authors have provided in-depth insight into the current state of
research in ICT as well as identified successful approaches, tools
and methodologies in ICT research. They explore points of good
practices, while addressing potential pitfalls to avoid, and
examining and evaluating solutions to some of ICT researchers'
toughest challenges.
|
|